Found 105 Articles for Information Technology

The Bluetooth Frame Structure

Moumita
Updated on 11-Sep-2020 10:49:51

3K+ Views

The Bluetooth network technology connects mobile devices wirelessly using short-wavelength, ultra-high frequency (UHF) radio waves over a short range to form a personal area network (PAN). Data is transferred between the Bluetooth devices as data frames. Two basic frame formats are defined, for transmitting data at basic data rate and for transmitting data at enhanced data rate.Bluetooth Frame Format with Basic Data RateA Bluetooth frame with basic rate has three parts, access code, header and data as shown in the following diagram−The various fields are−Access Code− A 72-bit field containing synchronization bits to identify the master.Header− A 54-bit field containing ... Read More

Asynchronous Connection-Less (ACL) Link

Moumita
Updated on 11-Sep-2020 10:48:24

1K+ Views

Bluetooth link layers define two types of data links, Asynchronous Connection-Less (ACL) Link, being one of them. It is the type of link used for transmission of general data packets using Bluetooth connection. ACL is a point – to – multipoint link used for irregular traffic between a master device and one or more slave devices.Features of Bluetooth ACL linksACL is a packet oriented link, i.e. the link establishes a packet – switched network.ACL is used for transmission of data traffic which are delivered at irregular intervals, where maintaining data integrity is more important than the time latency.Both symmetric and ... Read More

Synchronous Connection-Oriented (SCO) Link

Moumita
Updated on 11-Sep-2020 10:43:39

2K+ Views

Bluetooth link layers define two types of data links, Synchronous Connection Oriented (SCO) link, being one of them. SCO is a symmetric, point-to-point link between the master device and the slave device connected via Bluetooth.Features of Bluetooth SCO linksIn SCO, a dedicated, point-to-point link is established between the master device and the slave device before communication starts.SCO is a symmetric link, i.e. fixed slots are allocated for each direction.Since fixed slots are reserved, SCO provides a circuit switched connection.SCO radio links are used for time critical data transfer, particularly for voice data.Both the master and the slave device transmit encoded ... Read More

Difference between ACL and SCO Link in Bluetooth

Moumita
Updated on 11-Sep-2020 10:42:17

4K+ Views

Two types of data links are defined by Bluetooth link layers−Synchronous Connection Oriented (SCO) LinkAsynchronous Connection-Less (ACL) LinkSCO is a symmetric, point-to-point link between the master device and the slave device connected via Bluetooth.ACL is a point – to – multipoint link for transmitting general data packets using Bluetooth connection. ACL is used for irregular traffic between a master device and one or more slave devices.Differences between SCO and ACLSCOACL1SCO provides a circuit switched connection, where a dedicated, point-to-point link is established between the master device and the slave device before communication starts.ACL is a packet oriented link, i.e. the ... Read More

Radio Frequency IDentification (RFID)

Moumita
Updated on 11-Sep-2020 11:10:47

3K+ Views

Radio Frequency Identification (RFID) is the application of radio waves to read and capture information stored on tags affixed to objects. RFID readers are installed at tracking points and can read information from tags when they come into range, which can be of several feet radius. A tag need not be within direct line-of-sight of the reader to be tracked. RFID is used to check identities and track inventory, assets and people. RFID tags can be attached to a variety of objects like cash, clothing, baggage, parcels, and even implanted in animals and people.Working PrincipleThere are two parts in a ... Read More

The Bluetooth Link Layers

Mandalika
Updated on 11-Sep-2020 08:28:01

3K+ Views

The Bluetooth link layer outlines the way Bluetooth devices can use the raw transmission facility given by the radio layer to exchange information. The functions of the link layer is very close to MAC (medium access control) sublayer of the OSI model.The following diagram shows the position of link layers in the Bluetooth protocol architecture −Functions of the Bluetooth Link LayerDefining procedures for discovering Bluetooth devices.Establishing logical links between the Bluetooth devices that are communicating. One of the devices is assigned as master and the other is the slave.Broadcasting data to be sent. Managing the links between the devices throughout ... Read More

How Change Management Works in IT Industry

Samual Sam
Updated on 28-Jan-2020 11:03:21

96 Views

Change Management is an approach to transitioning organizations, teams and individuals from their current state to a new desired state for the future. The purpose of Change Management is to establish standardized procedures for the handling of IT-related change requests and facilitates the assessment, scheduling, coordination, documentation and evaluation of all changes.A Change can be initiated both from within the organization and from external forces. Externally, competition may drive an organization to change a product. Internally, a problem may be identified and change management is seen as the process by which a solution can be implemented with the organization.Change Management ... Read More

Key Points on Automation

Sharon Christine
Updated on 24-Jan-2020 09:59:23

448 Views

Automation is one of the hot domain in the Information and Technology, which has become predominant topic of discussion among the IT professionals. In general, automation can be defined as the process of involving software robots or hardware robots to solve the human problems (requirements). Due to this automation, it is said that ¼th of the job will be lost in the market. But people still prefer automation for (top) 7 reasons, which is discussed in this article.Cost SavingsCost is one of the major factor in the software development cycle, which predominantly comes into picture right from the planning phase. ... Read More

Important MYSQL Performance Tuning and Settings after Installation

Sharon Christine
Updated on 24-Jan-2020 09:50:49

442 Views

In this article, we will learn and discuss some important performance tuning settings for MySQL which we need to implement after the MySQL Installation better and speedy performance.Pre-requisitesAssuming that we have already installed the MySQL, I am providing some tips before we start to know about Performance tuning settings for MySQL.Even experienced IT persons may make some mistakes which will lead to many problems, so before we apply any recommendations which are shown in this article, we will keep the below items in mind to avoid issues or problems.We will apply only one setting at a time so that we ... Read More

How Ethical Hacking is Helping IT Security?

Sharon Christine
Updated on 24-Jan-2020 08:15:14

97 Views

While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ... Read More

Advertisements